<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>data privacy Archives - China Collaborative Group</title>
	<atom:link href="https://www.theccgway.com/tag/data-privacy/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.theccgway.com/tag/data-privacy/</link>
	<description>Cross-border business solutions for global decision makers</description>
	<lastBuildDate>Thu, 05 Jan 2023 12:25:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.1.1</generator>

<image>
	<url>https://www.theccgway.com/wp-content/uploads/2021/04/favicon-100x100.png</url>
	<title>data privacy Archives - China Collaborative Group</title>
	<link>https://www.theccgway.com/tag/data-privacy/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Der neue Digital Services Act</title>
		<link>https://www.theccgway.com/2022/09/01/der-neue-digital-services-act/</link>
		
		<dc:creator><![CDATA[CCG]]></dc:creator>
		<pubDate>Thu, 01 Sep 2022 08:24:50 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[swiss]]></category>
		<guid isPermaLink="false">https://www.theccgway.com/?p=14558</guid>

					<description><![CDATA[<p>Der Digital Services Act (DSA) ist eine neue Verordnung der Europäischen Union, die damit sog. Online-Vermittlungsdienste (Online-Intermediäre) wie Marktplätze oder Social Media Plattformen stärker in die Pflicht nehmen und höhere...</p>
<p>The post <a rel="nofollow" href="https://www.theccgway.com/2022/09/01/der-neue-digital-services-act/">Der neue Digital Services Act</a> appeared first on <a rel="nofollow" href="https://www.theccgway.com">China Collaborative Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Der Digital Services Act (DSA) ist eine neue Verordnung der Europäischen Union, die damit sog. Online-Vermittlungsdienste (Online-Intermediäre) wie Marktplätze oder Social Media Plattformen stärker in die Pflicht nehmen und höhere Transparenz im Internet schaffen will. Durch den DSA soll auch die enorme Marktmacht der grossen amerikanischen Tech-Konzerne  eingeschränkt werden. Der neue Rechtsrahmen für Online-Angebote soll voraussichtlich 2023 in Kraft treten.</p>
<p>Anwendbar ist der DSA auf alle Vermittlungsdienste, die ihre Dienstleistungen in der EU anbieten. Davon ausgenommen sind Klein- und Kleinstunternehmen. Es gilt analog zur DSGVO, die extraterritoriale Wirkung, weshalb somit auch Schweizer Online-Vermittlungsdienste, die ihre Dienstleistungen in Europa anbieten, grundsätzlich ab Inkrafttreten der Verordnung unter den DSA fallen. Nachfolgend wird zwischen vier Kategorien von Online-Intermediären unterschieden, wobei gilt, je höher die Kategorie, desto umfassender die Pflichten gemäss DSA.</p>
<p><u>Kategorie 1: Alle Vermittlungsdienste / Online-Intermediäre</u></p>
<ul>
<li>Pflicht, gegen illegale Inhalte vorzugehen und/oder Pflicht zur Herausgabe von Informationen, falls verfügt (keine Überwachungspflicht der Vermittlungsdienste / Online-Intermediäre);</li>
<li>Einrichtung einer zentralen Kontaktstelle (single–point-of–contact) in der EU;</li>
<li>Ernennung eines Rechtsvertreters, falls keine Niederlassung in der EU;</li>
<li>Transparenzpflichten in den allgemeinen Geschäftsbedingungen;</li>
<li>Mindestens jährliche Berichterstattung an den Koordinator für digitale Dienste des EU-Mitgliedstaates über Moderation von Inhalten.</li>
</ul>
<p><u>Kategorie 2: Nur Hosting-Provider (inkl. Online-Plattformen)</u></p>
<ul>
<li>Alle Pflichten aus Kategorie 1 und zusätzlich:</li>
<li>Pflichten zu Melde- und Abhilfeverfahren;</li>
<li>Mitteilung der Gründe für Entfernung von Inhalten oder Zugangssperren;</li>
<li>Veröffentlichung von anonymisierten Entscheiden.</li>
</ul>
<p><u>Kategorie 3: Nur Online-Plattformen</u></p>
<ul>
<li>Alle Pflichten aus Kategorie 1 + 2 und zusätzlich:</li>
<li>Beschwerde- und Rechtsbehelfsmechanismus sowie aussergerichtliche Streitbeilegung;</li>
<li>Priorisierung von Meldungen von sog. „vertrauenswürdigen Hinweisgebern“;</li>
<li>Massnahmen gegen missbräuchliche Meldungen sowie Gegendarstellungen;</li>
<li>Sicherheitsüberprüfung von Drittanbietern;</li>
<li>Transparenz von Online-Werbung gegenüber Nutzerinnen;</li>
<li>Meldung von Straftaten.</li>
</ul>
<p><u>Kategorie 4: Nur sehr grosse Online-Plattformen (mehr als 45 Mio. User/Monat)</u></p>
<ul>
<li>Alle Pflichten aus Kategorie 1, 2 + 3 und zusätzlich:</li>
<li>Risikomanagement-Pflichten und Ernennung eines Compliance-Beauftragten;</li>
<li>Jährliche externe Risikoprüfungen und öffentliche Rechenschaftspflicht;</li>
<li>Transparenz der Empfehlungssysteme und Wahlmöglichkeiten für Nutzerinnen beim Zugriff auf Information;</li>
<li>Datenaustausch mit Behörden aus der Forschung.</li>
</ul>
<p>Bei Verletzungen drohen den Unternehmen empfindliche Geldbussen von bis zu 6% der Jahreseinnahmen oder des Jahresumsatzes. Zudem können Geldstrafen für fortgesetzte Verstösse in Höhe von bis zu 5% des durchschnittlichen Tagesumsatzes verhängt werden.</p>
<p>Besteht nun Handlungsbedarf für Ihr Unternehmen?</p>
<p>Zwar wird die Verordnung voraussichtlich erst 2023 in Kraft treten, wir empfehlen Ihnen jedoch, frühzeitig die kommenden Entwicklungen zum DSA zu verfolgen und insbesondere schon vorab abzuklären, ob Ihr Unternehmen unter den DSA fallen wird.</p>
<p>Haben Sie weitere Fragen? Das HütteLAW-Team berät Sie gerne.</p>
<p><strong>Author: </strong>Stephanie Kaiser</p>
<p><em>This content appears as a courtesy of </em><a href="http://www.huettelaw.ch/en/home"><strong><em>HütteLAW</em></strong></a><em>, a proud member of the</em><a href="https://theccgway.com/"> <strong><em>China Collaborative Group (CCG Association)</em></strong></a><em>. It is informational in nature and does not constitute legal advice or establish an attorney-client relationship between you and its author, publisher or any member of CCG. For more information, please visit </em><strong><a href="http://www.huettelaw.ch/"><em>www.huettelaw.ch</em></a><em>.</em></strong></p>
<p>The post <a rel="nofollow" href="https://www.theccgway.com/2022/09/01/der-neue-digital-services-act/">Der neue Digital Services Act</a> appeared first on <a rel="nofollow" href="https://www.theccgway.com">China Collaborative Group</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Dos and Don’ts of Processing Employee Data under Personal Information Protection Law in China</title>
		<link>https://www.theccgway.com/2022/05/05/the-dos-andonts-of-processing-employee-data-under-personal-information-protection-law-in-china/</link>
		
		<dc:creator><![CDATA[CCG]]></dc:creator>
		<pubDate>Thu, 05 May 2022 09:21:06 +0000</pubDate>
				<category><![CDATA[China]]></category>
		<category><![CDATA[Law]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[foreign investment]]></category>
		<guid isPermaLink="false">https://www.theccgway.com/?p=4566</guid>

					<description><![CDATA[<p>Personal Information Protection Law (‘PIPL’), effective from 1 November 2021, regulates those collecting and handling personal information. For companies processing employee data, a robust data security system should be integrated...</p>
<p>The post <a rel="nofollow" href="https://www.theccgway.com/2022/05/05/the-dos-andonts-of-processing-employee-data-under-personal-information-protection-law-in-china/">The Dos and Don’ts of Processing Employee Data under Personal Information Protection Law in China</a> appeared first on <a rel="nofollow" href="https://www.theccgway.com">China Collaborative Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="entry-content clearfix">
<p>Personal Information Protection Law (‘PIPL’), effective from 1 November 2021, regulates those collecting and handling personal information. For companies processing employee data, a robust data security system should be integrated into the IT infrastructure and in line with PIPL.</p>
<p>Whilst PIPL largely affects companies handling consumer data, employers are not immune from PIPL and should be fully compliant to mitigate risks. Specifically, the Civil Code of the People’s Republic of China amended in 2020 defines personal information as the below.</p>
<p><em>‘Personal information refers to any information electronically or otherwise recorded that can be used, either alone or in combination with other information, to identify a specific natural person, including the name, date of birth,</em> <em>identification document number, bio-metric information, address, telephone number, email address, health</em> <em>information or whereabouts of the natural person.’ (Article 1032)</em></p>
<p>Therefore, employers should strengthen internal employee data management systems to secure employees’ data. At Horizons, we have been advising companies in formulating compliance mechanisms. In the below, we outline the main dos and don’ts of processing employee data from our experience.</p>
<p><strong>Do implement a classification management</strong></p>
<p>Companies should review the existing personal information of employees and classify the information according to the level of sensitivity. Under PIPL, employers are not required to obtain employees’ consent where it is necessary for carrying out human resources management under an employment policy legally established or collective legally concluded (Art. 13). However, separate consent is required for the handling of information that is not included in employment policies or labour contracts. Namely, companies processing sensitive information that is not included in human resources management (including religious beliefs, biometrics, specific identities, medical and health and financial accounts, whereabouts, and other information of a natural person) will need to obtain a separate consent and sensitive personal information are subject to stricter measures.</p>
<p>We suggest companies utilise a classification system on the personal information held and establish robust policies to process the data according to PIPL.</p>
<p><strong>Don’t overlook technical security measures</strong></p>
<p>Companies should have already established cyber security measures under the Cyber Security Law (‘CSL’) effective from 2017. Specifically, the network system should be protected from cyber-attacks and leakage. Regularly reviewing the IT system and updating equipment and software are essential for companies to be safeguarded from new forms of cyber-attacks.</p>
<p>Equally, contracting the processing of personal information to third parties can be vulnerable areas. We advise companies to review related contracts/agreements to ensure third parties do not infringe on personal privacy rights. If necessary, clauses should be redrawn to comply with PIPL and CSL.</p>
<p><strong>Do assess control and schedule regular training</strong></p>
<p>Where necessary, companies may only transfer personal information outside of mainland China by meeting one of the conditions in Article 38 of PIPL.</p>
<ul>
<li>Where a security assessment organized by the national cyberspace authority has been passed under</li>
<li>Article 40 of this Law;</li>
<li>Where certification of personal information protection has been given by a professional institution in accordance</li>
<li>with the regulations of the national cyberspace authority;</li>
<li>Where a contract in compliance with the standard contract provided by the national cyberspace authority has</li>
<li>been concluded with the overseas recipient, establishing the rights and obligations of both parties; or</li>
<li>Where any other condition prescribed by law, administrative regulations, or the national cyberspace authority is</li>
<li>met.</li>
<li>Where there is any stipulation on the condition or any other stipulation for the provision of personal information to a recipient outside the territory of the People’s Republic of China in any international treaty or agreement concluded or</li>
<li>acceded to by the People’s Republic of China, such stipulation may apply.</li>
</ul>
<p>Though the national cyberspace authority has not issued the aforementioned materials yet, companies must draft a control mechanism and regular training for related personnel-in-charge to ensure international data transfer complies with PIPL and forthcoming regulations.</p>
<p><strong>Don’t neglect incidents emergency response plan</strong></p>
<p>The amended Civil Code addresses the protection of personal information and the right to privacy. Privacy is defined under the Civil Code as the following:</p>
<p><em>The private life of a natural person is not to be intruded upon, as well as any private space, private activity, or</em> <em>private information of the natural person that he or she does not want to be known by others. [And] no organization</em> <em>or individual may, by means of spying, intrusion, exposure, disclosure, or otherwise, infringe upon another’s right to</em> <em>privacy. (Article 1032)</em></p>
<p>In other words, employers must protect the employee’s personal information and their right to privacy when handling employees’ data. As a result, companies should not neglect to implement an incident emergency response plan to demonstrate their commitment to protecting personal information. The company may utilise the emergency response plan provisions under CSL as guidelines.</p>
<p>Both the amended Civil Code and PIPL call for employers to strictly regulate the handling of employees’ personal information. Specifically, a comprehensive internal governance system should be established to migrate penalties. Failure to perform obligations under the PIPL can be subject to a fine of CNY 1 million on the violator and any person in charge or another individual directly involved will face fines between CNY 100,000 and CNY 1 million, as well as be suspended from serving as director, supervisor, senior officer, or personal information protection officer of an enterprise for a period of time.</p>
<p>Consequently, severe penalties require employers to act immediately and understand PIPL obligations seriously.</p>
</div>
<p><em>This content appears as a courtesy of </em><a href="http://horizons-advisory.com/"><strong><em>Horizons Corporate Advisory</em></strong></a><em>, a proud member of the</em><a href="https://theccgway.com/"> <strong><em>China Collaborative Group (CCG Association)</em></strong></a><em>. It is informational in nature and does not constitute legal advice or establish an attorney-client relationship between you and its author, publisher or any member of CCG. For more information, please visit </em><a href="http://www.horizons-advisory.com"><strong><em>www.horizons-advisory.com</em></strong></a><em>. </em></p>
<p>The post <a rel="nofollow" href="https://www.theccgway.com/2022/05/05/the-dos-andonts-of-processing-employee-data-under-personal-information-protection-law-in-china/">The Dos and Don’ts of Processing Employee Data under Personal Information Protection Law in China</a> appeared first on <a rel="nofollow" href="https://www.theccgway.com">China Collaborative Group</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The New Digital Services Act</title>
		<link>https://www.theccgway.com/2022/03/23/the-new-digital-services-act/</link>
		
		<dc:creator><![CDATA[CCG]]></dc:creator>
		<pubDate>Wed, 23 Mar 2022 14:22:10 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Law]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[swiss]]></category>
		<guid isPermaLink="false">https://www.theccgway.com/?p=4537</guid>

					<description><![CDATA[<p>Der neue Digital Services Act Der Digital Services Act (DSA) ist eine neue Verordnung der Europäischen Union, die damit sog. Online-Vermittlungsdienste (Online-Intermediäre) wie Marktplätze oder Social Media Plattformen stärker in...</p>
<p>The post <a rel="nofollow" href="https://www.theccgway.com/2022/03/23/the-new-digital-services-act/">The New Digital Services Act</a> appeared first on <a rel="nofollow" href="https://www.theccgway.com">China Collaborative Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Der neue Digital Services Act</strong></p>
<p>Der Digital Services Act (DSA) ist eine neue Verordnung der Europäischen Union, die damit sog. Online-Vermittlungsdienste (Online-Intermediäre) wie Marktplätze oder Social Media Plattformen stärker in die Pflicht nehmen und höhere Transparenz im Internet schaffen will. Durch den DSA soll auch die enorme Marktmacht der grossen amerikanischen Tech-Konzerne  eingeschränkt werden. Der neue Rechtsrahmen für Online-Angebote soll voraussichtlich 2023 in Kraft treten.</p>
<p>Anwendbar ist der DSA auf alle Vermittlungsdienste, die ihre Dienstleistungen in der EU anbieten. Davon ausgenommen sind Klein- und Kleinstunternehmen. Es gilt analog zur DSGVO, die extraterritoriale Wirkung, weshalb somit auch Schweizer Online-Vermittlungsdienste, die ihre Dienstleistungen in Europa anbieten, grundsätzlich ab Inkrafttreten der Verordnung unter den DSA fallen. Nachfolgend wird zwischen vier Kategorien von Online-Intermediären unterschieden, wobei gilt, je höher die Kategorie, desto umfassender die Pflichten gemäss DSA.</p>
<p><u>Kategorie 1: Alle Vermittlungsdienste / Online-Intermediäre</u></p>
<ul>
<li>Pflicht, gegen illegale Inhalte vorzugehen und/oder Pflicht zur Herausgabe von Informationen, falls verfügt (keine Überwachungspflicht der Vermittlungsdienste / Online-Intermediäre);</li>
<li>Einrichtung einer zentralen Kontaktstelle (single–point-of–contact) in der EU;</li>
<li>Ernennung eines Rechtsvertreters, falls keine Niederlassung in der EU;</li>
<li>Transparenzpflichten in den allgemeinen Geschäftsbedingungen;</li>
<li>Mindestens jährliche Berichterstattung an den Koordinator für digitale Dienste des EU-Mitgliedstaates über Moderation von Inhalten.</li>
</ul>
<p><u>Kategorie 2: Nur Hosting-Provider (inkl. Online-Plattformen)</u></p>
<ul>
<li>Alle Pflichten aus Kategorie 1 und zusätzlich:</li>
<li>Pflichten zu Melde- und Abhilfeverfahren;</li>
<li>Mitteilung der Gründe für Entfernung von Inhalten oder Zugangssperren;</li>
<li>Veröffentlichung von anonymisierten Entscheiden.</li>
</ul>
<p><u>Kategorie 3: Nur Online-Plattformen</u></p>
<ul>
<li>Alle Pflichten aus Kategorie 1 + 2 und zusätzlich:</li>
<li>Beschwerde- und Rechtsbehelfsmechanismus sowie aussergerichtliche Streitbeilegung;</li>
<li>Priorisierung von Meldungen von sog. „vertrauenswürdigen Hinweisgebern“;</li>
<li>Massnahmen gegen missbräuchliche Meldungen sowie Gegendarstellungen;</li>
<li>Sicherheitsüberprüfung von Drittanbietern;</li>
<li>Transparenz von Online-Werbung gegenüber Nutzerinnen;</li>
<li>Meldung von Straftaten.</li>
</ul>
<p><u>Kategorie 4: Nur sehr grosse Online-Plattformen (mehr als 45 Mio. User/Monat)</u></p>
<ul>
<li>Alle Pflichten aus Kategorie 1, 2 + 3 und zusätzlich:</li>
<li>Risikomanagement-Pflichten und Ernennung eines Compliance-Beauftragten;</li>
<li>Jährliche externe Risikoprüfungen und öffentliche Rechenschaftspflicht;</li>
<li>Transparenz der Empfehlungssysteme und Wahlmöglichkeiten für Nutzerinnen beim Zugriff auf Information;</li>
<li>Datenaustausch mit Behörden aus der Forschung.</li>
</ul>
<p>Bei Verletzungen drohen den Unternehmen empfindliche Geldbussen von bis zu 6% der Jahreseinnahmen oder des Jahresumsatzes. Zudem können Geldstrafen für fortgesetzte Verstösse in Höhe von bis zu 5% des durchschnittlichen Tagesumsatzes verhängt werden.</p>
<p>Besteht nun Handlungsbedarf für Ihr Unternehmen?</p>
<p>Zwar wird die Verordnung voraussichtlich erst 2023 in Kraft treten, wir empfehlen Ihnen jedoch, frühzeitig die kommenden Entwicklungen zum DSA zu verfolgen und insbesondere schon vorab abzuklären, ob Ihr Unternehmen unter den DSA fallen wird.</p>
<p>Haben Sie weitere Fragen? Das HütteLAW-Team berät Sie gerne.</p>
<p><strong>Author: </strong>Stephanie Kaiser</p>
<p><em>This content appears as a courtesy of </em><a href="http://www.huettelaw.ch/en/home"><strong><em>HütteLAW</em></strong></a><em>, a proud member of the</em><a href="https://theccgway.com/"> <strong><em>China Collaborative Group (CCG Association)</em></strong></a><em>. It is informational in nature and does not constitute legal advice or establish an attorney-client relationship between you and its author, publisher or any member of CCG. For more information, please visit </em><strong><a href="http://www.huettelaw.ch/"><em>www.huettelaw.ch</em></a><em>.</em></strong></p>
<p>The post <a rel="nofollow" href="https://www.theccgway.com/2022/03/23/the-new-digital-services-act/">The New Digital Services Act</a> appeared first on <a rel="nofollow" href="https://www.theccgway.com">China Collaborative Group</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Are you ready for the new Swiss Federal Act on Data Protection?</title>
		<link>https://www.theccgway.com/2022/03/09/are-you-ready-for-the-new-swiss-federal-act-on-data-protection/</link>
		
		<dc:creator><![CDATA[CCG]]></dc:creator>
		<pubDate>Wed, 09 Mar 2022 06:51:56 +0000</pubDate>
				<category><![CDATA[Law]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[data privacy]]></category>
		<guid isPermaLink="false">https://www.theccgway.com/?p=4535</guid>

					<description><![CDATA[<p>Bereit für das neue Schweizer Datenschutzgesetz? Das müssen Sie beachten Voraussichtlich Mitte/Ende 2022 wird das neue Schweizer Datenschutzgesetz (nDSG) in Kraft treten, welches den aktuellen Erlass aus dem Jahr 1992...</p>
<p>The post <a rel="nofollow" href="https://www.theccgway.com/2022/03/09/are-you-ready-for-the-new-swiss-federal-act-on-data-protection/">Are you ready for the new Swiss Federal Act on Data Protection?</a> appeared first on <a rel="nofollow" href="https://www.theccgway.com">China Collaborative Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Bereit für das neue Schweizer Datenschutzgesetz? Das müssen Sie beachten</strong></p>
<p>Voraussichtlich Mitte/Ende 2022 wird das neue Schweizer Datenschutzgesetz (nDSG) in Kraft treten, welches den aktuellen Erlass aus dem Jahr 1992 ersetzen wird. Dieser ist in Anbetracht der rasanten technologischen Entwicklung ziemlich in die Jahre gekommen, gab es doch bei seiner Inkraftsetzung 1992 weder Google, Facebook noch das iPhone. Das Ziel der Revision ist die Anhebung des Datenschutzrechts auf das Niveau der EU und entsprechend eine Annäherung an die EU-Datenschutzverordnung (DSGVO).</p>
<p>Nachfolgend die wichtigsten Neuerungen gegenüber dem geltendem Recht:</p>
<p><u>1. Kein Schutz mehr von Daten juristischer Personen</u></p>
<p>Bis anhin fielen natürliche und juristische Personen unter das Schweizer Datenschutzgesetz (DSG). Neu ist das Schweizer DSG nur noch auf natürliche Personen anwendbar, die Daten von juristischen Personen fallen nicht mehr darunter. Letztere können sich aber weiterhin z.B. auf den Persönlichkeitsschutz nach ZGB berufen.</p>
<p><u>2. Neue Kategorien von besonders schützenswerten Personendaten</u></p>
<p>Die Kategorien der besonders schützenswerten Personendaten wurden erweitert. Neu zählen auch Daten über die Zugehörigkeit zu einer Ethnie, genetische Daten und biometrische Daten, die eine natürliche Person eindeutig identifizieren, dazu.</p>
<p><u>3. Regelung des Profilings</u></p>
<p>Aktuell ist das „Profiling“ nicht explizit im Gesetz erwähnt. Neu enthält das Datenschutzgesetz eine Legaldefinition von „Profiling“ und „Profiling mit hohem Risiko“. Profiling mit hohem Risiko liegt dann vor, „wenn die automatisierte Bearbeitung von Personendaten und eine Verknüpfung von Daten die Beurteilung wesentlicher Aspekte der Persönlichkeit erlaubt.“ Bei Profiling mit hohem Risiko muss eine allenfalls erforderliche Einwilligung der betroffenen Person für die Datenbearbeitung ausdrücklich vorliegen.</p>
<p><u>4. Datenschutz durch Technik und datenschutzfreundliche Voreinstellungen</u></p>
<p>Die beiden Grundsätze des „Datenschutzes durch Technik“ und „Datenschutz durch datenschutzfreundliche Voreinstellungen“ sind neu im Datenschutzgesetz verankert. Datenschutz durch Technik (Privacy-by-Design) bedeutet, dass vom Verantwortlichen bereits bei der Planung der Verarbeitung von Personendaten angemessene technische und organisatorische Massnahmen getroffen werden müssen, um die Umsetzung von Datenschutzgrundsätzen zu gewährleisten (z.B. Datenminimierung, selektiver Passwortschutz, etc.). Beim Datenschutz durch datenschutzfreundliche Voreinstellungen (Privacy-by-Default) geht es darum, dass beispielsweise Apps oder Websites so gestaltet werden, dass die Bearbeitung der Personendaten auf das für den Verwendungszweck nötige Mindestmass beschränkt ist.</p>
<p><u>5. Auftragsbearbeiter</u></p>
<p>Neu darf ein Auftragsbearbeiter von Daten nur mit vorgängiger Genehmigung des Verantwortlichen einen Dritten für die Datenbearbeitung beiziehen. Im aktuellen Datenschutzgesetz ist diese Genehmigung noch nicht erforderlich.</p>
<p><u>6. Verzeichnis sämtlicher Bearbeitungstätigkeiten</u></p>
<p>Der Verantwortliche muss neu ein Verzeichnis über sämtliche Bearbeitungstätigkeiten von Daten führen. Wird die Datenbearbeitung an einen Auftragsbearbeiter delegiert, müssen der Verantwortliche und der Auftragsbearbeiter je ein separates Verzeichnis führen.</p>
<p>Folgende Mindestangaben müssen in einem solchen Verzeichnis enthalten sein:</p>
<p>&#8211; Identität des Verantwortlichen;</p>
<p>&#8211; Bearbeitungszweck;</p>
<p>&#8211; eine Beschreibung der Kategorien betroffener Personen und der Kategorien bearbeiteter Personendaten;</p>
<p>&#8211; die Kategorien der Empfängerinnen und Empfänger;</p>
<p>&#8211; wenn möglich die Aufbewahrungsdauer der Personendaten oder die Kriterien zur Festlegung dieser Dauer;</p>
<p>&#8211; wenn möglich eine allgemeine Beschreibung der Massnahmen zur Gewährleistung der Datensicherheit (geeignete technische und organisatorische Massnahmen, die es ermöglichen Verletzungen der Datensicherheit zu vermeiden);</p>
<p>&#8211; falls die Daten ins Ausland bekanntgegeben werden, die Angabe des Staates sowie die Garantien, durch die ein geeigneter Datenschutz gewährleistet wird.</p>
<p>Davon ausgenommen sind Unternehmen mit weniger als 250 Mitarbeitenden, deren Datenbearbeitung ein geringes Risiko von Verletzungen der Persönlichkeit der betroffenen Personen mit sich bringt.</p>
<p><u>7. Bekanntgabe von Personendaten ins Ausland</u></p>
<p>Die Bekanntgabe von Personendaten ins Ausland wird neu formell anders geregelt: der Bundesrat legt verbindlich fest, welche Staaten über einen angemessenen Datenschutzstandard verfügen und folglich wohin der Datenexport erlaubt ist. Bisher hat der EDÖB dies festgelegt, seine Länderliste war jedoch nicht verbindlich. In der Praxis dürfte diese Änderung kaum Auswirkungen haben.</p>
<p><u>8. Erweiterte Informationspflicht</u></p>
<p>Die Informationspflicht gegenüber der betroffenen Person wird im nDSG stark ausgebaut. Neu gibt es eine generelle Informationspflicht bei der Beschaffung von Personendaten, bis anhin hat die Pflicht nur die Beschaffung von besonders schützenswerten Personendaten und Persönlichkeitsprofilen betroffen.</p>
<p>Der betroffenen Person sind mindestens folgende Informationen mitzuteilen: Identität und Kontaktdaten des Verantwortlichen, Bearbeitungszweck, Empfänger und Empfängerinnen oder Kategorien von Empfängern und Empfängerinnen, denen Personendaten bekannt gegeben werden, sowie bei Bekanntgabe von Daten ins Ausland zusätzlich der Staat und gegebenenfalls die Garantien für einen geeigneten Datenschutz oder einen allfälligen  Ausnahmetatbestand.</p>
<p>Im neuen Datenschutzgesetz ist nicht geregelt, auf welchem Weg die betroffene Person informiert werden muss. Es gibt also kein gesetzliches Formerfordernis hierfür, aber es ist eine angemessene Form zu wählen. Ob z.B. eine Datenschutzerklärung auf der Website dafür ausreichend ist, wird sich zeigen müssen.</p>
<p><u>9. Ausbau der Betroffenenrechte </u></p>
<p>Neben den erweiterten Informationspflichten erhalten Betroffene im nDSG weitere Rechte. So kann zukünftig jede Person vom Verantwortlichen kostenlos die Herausgabe ihrer Personendaten in einem gängigen elektronischen Format verlangen.  Weiter kann Sie auch verlangen, dass ihre Personendaten an einen anderen Verantwortlichen in maschinenlesbarer Form übertragen werden. Dieses Auskunftsrecht kann unter bestimmten Voraussetzungen eingeschränkt werden. Ferner haben Betroffene bei sog. automatisierten Einzelfallentscheidungen (d.h. eine Entscheidung, die ausschliesslich von Computerprogrammen getroffen wurde) ein Widerspruchsrecht. Die Person bekommt die Möglichkeit, ihren Standpunkt darzulegen und kann verlangen, dass die Entscheidung von einer natürlichen Person geprüft wird.</p>
<p><u>10. Datenschutz-Folgenabschätzung</u></p>
<p>Vor einer Datenbearbeitung muss neu eine Datenschutz-Folgeabschätzung vom Verantwortlichen vorgenommen werden, wenn eine beabsichtige Datenbearbeitung ein hohes Risiko einer Verletzung der Persönlichkeit oder der Grundrechte der betroffenen Person mit sich bringt. D.h. der Verantwortliche muss insbesondere die geplante Bearbeitung, die entstehenden Risiken sowie geeigneten Massnahmen dagegen darlegen.</p>
<p>&nbsp;</p>
<p><u>11. Meldung von Verletzungen des Datenschutzes</u></p>
<p>Der Verantwortliche muss neu dem EDÖB bei einer Datenschutzverletzung sobald wie möglich Meldung erstatten, wenn grosse Risiken für die Persönlichkeit oder die Grundrechte der betroffenen Person bestehen. Ist es zu ihrem Schutz erforderlich, muss auch die betroffene Person informiert werden. Geschah die Datenschutzverletzung bei einem Auftragsbearbeiter, muss dieser die Verletzung so rasch als möglich dem Verantwortlichen melden.</p>
<p>&nbsp;</p>
<p><u>12. Ausbau der Befugnisse des EDÖB</u></p>
<p>Der EDÖB hat neu erweiterte Kompetenzen zur Durchsetzung des nDSG. Er kann von Amtes wegen oder auf Anzeige eine Untersuchung einleiten und bei Verstössen gegen Datenschutzvorschriften weitreichende Massnahmen anordnen, wie die Anpassung oder Unterbrechung der Datenbearbeitung oder gar die Datenlöschung.</p>
<p>Ferner stehen den betroffenen Personen zivilrechtliche Rechtsbehelfe zur Durchsetzung ihrer Ansprüche zur Verfügung. Gleichzeitig wurde die Zivilprozessordnung (ZPO) angepasst, welche die entsprechenden Gerichtsverfahren für kostenlos erklärt.</p>
<p><u>13. Verschärfte Sanktionen</u></p>
<p>Der Bussenkatalog wurde im nDSG deutlich verschärft. Neu können private Personen, d.h. die fehlbaren Entscheidungsträger, mit einer Busse von bis zu CHF 250&#8217;000.- bestraft werden, wenn sie vorsätzlich die Informations- und Auskunfts-, Mitwirkungs- oder Sorgfaltspflichten verletzen. Eventualvorsatz, also die Inkaufnahme der tatsächlich eingetretenen Verletzung, ist bereits ausreichend.</p>
<p>Was ist zu tun?</p>
<p>Bis zum Inkrafttreten des revidierten Schweizer Datenschutzgesetzes empfehlen wir Ihnen die folgenden Schritte:</p>
<ul>
<li>Innerhalb des Unternehmens regeln, wer Zugriff auf welche Daten hat und wer zuständig für den Datenschutz ist;</li>
<li>Mitarbeitende auf die Thematik sensibilisieren und schulen;</li>
<li>Prozessablauf für die Meldung von Datenschutzverletzungen festlegen;</li>
<li>Bestehende Datenschutzerklärung prüfen und gegebenenfalls anpassen;</li>
<li>Verzeichnis über sämtliche Datenbearbeitungen erstellen;</li>
<li>Verträge mit Auftragsbearbeitern prüfen, allenfalls Einwilligung für eine Unter-Auftragsbearbeitung erteilen;</li>
<li>Prozess für die Datenschutz-Folgenabschätzung einführen.</li>
</ul>
<p>Haben Sie weitere Fragen? Das HütteLAW-Team berät Sie gerne.</p>
<p><strong>Author: </strong>Stephanie Kaiser</p>
<p><em>This content appears as a courtesy of </em><a href="http://www.huettelaw.ch/en/home"><strong><em>HütteLAW</em></strong></a><em>, a proud member of the</em><a href="https://theccgway.com/"> <strong><em>China Collaborative Group (CCG Association)</em></strong></a><em>. It is informational in nature and does not constitute legal advice or establish an attorney-client relationship between you and its author, publisher or any member of CCG. For more information, please visit </em><strong><a href="http://www.huettelaw.ch/"><em>www.huettelaw.ch</em></a><em>.</em></strong></p>
<p>The post <a rel="nofollow" href="https://www.theccgway.com/2022/03/09/are-you-ready-for-the-new-swiss-federal-act-on-data-protection/">Are you ready for the new Swiss Federal Act on Data Protection?</a> appeared first on <a rel="nofollow" href="https://www.theccgway.com">China Collaborative Group</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>2022 China Employment</title>
		<link>https://www.theccgway.com/2022/03/02/4524/</link>
		
		<dc:creator><![CDATA[CCG]]></dc:creator>
		<pubDate>Wed, 02 Mar 2022 07:41:19 +0000</pubDate>
				<category><![CDATA[China]]></category>
		<category><![CDATA[Law]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Employment]]></category>
		<category><![CDATA[Horizons Corporate Advisory]]></category>
		<category><![CDATA[labour]]></category>
		<guid isPermaLink="false">https://www.theccgway.com/?p=4524</guid>

					<description><![CDATA[<p>Getting right personal information protection and maternity leave Currently, companies worldwide are called by both domestic and international regulations to become corporate citizens rather than merely profitable entities. In China,...</p>
<p>The post <a rel="nofollow" href="https://www.theccgway.com/2022/03/02/4524/">2022 China Employment</a> appeared first on <a rel="nofollow" href="https://www.theccgway.com">China Collaborative Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="entry-content clearfix">
<p><strong>Getting right personal information protection and maternity leave</strong></p>
<p>Currently, companies worldwide are called by both domestic and international regulations to become corporate citizens rather than merely profitable entities. In China, 2021, domestic legislation focused on data and cyber protection and introduced measures to support the third-child policy. Namely, Personal Information Protection Law (“PIPL”), effective from November 1 2022, obligates companies to strengthen personal data handling, process, and storage, and from late November, provinces and municipalities across China extended maternity leave to support the 3-child policy (announced on May 31, 2021, following the Chinese Communist Party Politburo meeting chaired by President Xi Jinping). As a result, in 2022, human resources (“HR”) across China should diligently implement plans to comply with such changes and obligations.</p>
<p>At Horizons, we have been working with clients to adjust employee policies and summarise the main aspects for human resources to practically implement changes.</p>
<p><strong>Personal Information Protection Law</strong></p>
<p>PIPL is the first legislation to address misuse of personal data and sets forth mandatory requirements for companies processing such data. Though data handling related to human resources do not require the employee’s consent, PIPL does introduce stricter obligations for those handling sensitive personal information, such as biometrics, religious beliefs, medical and health and so forth. Namely, companies shall obtain specific consent and inform such individuals of the necessity and impact on their rights and interests. Therefore, companies should audit the existing personal information processing systems to gain a comprehensive employee data overview and, if necessary, draft specific consent forms aligned with PIPL.</p>
<p>Equally, companies may only transfer personal information outside mainland China by fulfilling provisioned conditions. Under PIPL, such conditions are generally outlined and require further guidelines for companies to proceed ahead. We suggest HR keep abreast of forthcoming related guidelines, especially those handling large volumes of personal information that meet a threshold set by the National Cyberspace Authority.</p>
<p><strong>Maternity Leave</strong></p>
<p>In late November 2021, parental leave extensions were adopted in Chinese cities and provinces to stimulate the 3-child policy. Extended leave policies aim to reduce the burden of childbirth and childcare. The extended number of days varies from province to province or city to city, for example in Shanghai, maternity leave is extended to 158 days. For companies, the amended policies shall directly impact employee leave policies and workforce planning and costs to cover extended leave.</p>
<p>We suggest that companies should conduct an employee consultation process before any amendments are made to employee leave policies and ensure employees are entitled to the legally allocated number of leave days. Namely, clear specification of the type of leave and number of days such as maternity leave, paternal leave for working parents and carer’s leave. In this manner, companies can reduce the risk of labour disputes since the amendments are consented by employees and legal blinding.</p>
<p>Both PIPL and extended maternity leave reflect Environment Social and Governance (“ESG”) principles emerging in China. As an important international topic, we anticipate ESG to be present in forthcoming legislation in China, however, governed by President Xi Jinping Thought on Socialism with Chinese Characteristics.</p>
<p><em>This content appears as a courtesy of </em><a href="http://horizons-advisory.com/"><strong><em>Horizons Corporate Advisory</em></strong></a><em>, a proud member of the</em><a href="https://theccgway.com/"> <strong><em>China Collaborative Group (CCG Association)</em></strong></a><em>. It is informational in nature and does not constitute legal advice or establish an attorney-client relationship between you and its author, publisher or any member of CCG. For more information, please visit </em><a href="http://www.horizons-advisory.com"><strong><em>www.horizons-advisory.com</em></strong></a><em>. </em></p>
</div>
<p>The post <a rel="nofollow" href="https://www.theccgway.com/2022/03/02/4524/">2022 China Employment</a> appeared first on <a rel="nofollow" href="https://www.theccgway.com">China Collaborative Group</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Insights into Personal Data Protection Bill</title>
		<link>https://www.theccgway.com/2021/12/20/insights-into-personal-data-protection-bill/</link>
		
		<dc:creator><![CDATA[CCG]]></dc:creator>
		<pubDate>Mon, 20 Dec 2021 09:16:28 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Law]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[malawi]]></category>
		<guid isPermaLink="false">https://www.theccgway.com/?p=4444</guid>

					<description><![CDATA[<p>The Data Protection Bill [ DPB] seeks to consolidate provisions found in several Acts of Parliament for the protection and security of personal data in Malawi. At the outset, the...</p>
<p>The post <a rel="nofollow" href="https://www.theccgway.com/2021/12/20/insights-into-personal-data-protection-bill/">Insights into Personal Data Protection Bill</a> appeared first on <a rel="nofollow" href="https://www.theccgway.com">China Collaborative Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Data Protection Bill [ DPB] seeks to consolidate provisions found in several Acts of Parliament for the protection and security of personal data in Malawi. At the outset, the DPB is indeed comprehensive legislation in so far as data protection is concerned as it incorporates most of the internationally recognised norms and standards on data protection. This notwithstanding, some aspects have been left out or inadequately addressed. This brief commentary highlights the positive and notable aspects of the  DPB. In my next article I highlight the weaker aspects of the DPB that may still require attention before the DPB is enacted into law.</p>
<p><strong>DPB-the highlights</strong></p>
<p>As stated, the DPB comprehensively incorporates most of the governing norms on data protection.</p>
<p><strong>Comprehensive Incorporation of Core Principles on Data Protection</strong></p>
<p>There are several internationally recognised core norms for data protection. These include Fair and lawful processing of personal information, Purpose specification, Minimality, quality, Openness and transparency, Data subject participation, Sensitivity, Security and confidentiality and Accountability.<a href="#_ftn1" name="_ftnref1">[1]</a></p>
<p>The DPB mandates data controllers to process information fairly, in a transparent manner and subject to the data subject giving consent.<a href="#_ftn2" name="_ftnref2">[2]</a> This suffices as lawful processing of personal data under the DPB. Section 19 of the DPB also requires specific treatment for sensitive personal data. The DPB requires purpose specification for the processing of personal data, minimality, quality.<a href="#_ftn3" name="_ftnref3">[3]</a> Data subject participation is guaranteed under part IV of the DPB which outlines the rights of a data subject. Data security is comprehensively regulated under Part V of the DPB. In all this, it is easy to appreciate how comprehensive the DPB is in embracing the international norms and standard on data protection.</p>
<p><strong>Cross-Border Transfers of Personal Data</strong></p>
<p>The DPB adopts a comprehensive framework for cross-border transfer of personal data.<a href="#_ftn4" name="_ftnref4">[4]</a> This is a great step towards ensuring data protection in cross-border online transactions. This is because the DPB effectively provides a platform against which cross-border flows of personal data can be regulated. This can be sharply contrasted from the old Electronic Transactions and Cyber Security Act, which did not contain any provisions regulating cross-border flows of personal data in electronic transactions.</p>
<p>The DPB can be commended on many fronts including the condition of making data flows primarily subject to a decision on the adequacy of data protection in the foreign country to which the data will be transferred. <a href="#_ftn5" name="_ftnref5">[5]</a>  The DPB is progressive in that data transfers can be authorised where the foreign country has a law, binding corporate rules, contractual clauses, code of conduct, or certification mechanism that afford an adequate level of protection.<a href="#_ftn6" name="_ftnref6">[6]</a> This list is exhaustive enough to ensure sufficient facilitation of cross-border flows. In the absence of an adequate level of protection of any of the foregoing, a data transfer can be authorised under these conditions: if the data subject gives consent; if the processing is necessary for performance or conclusion of contract involving the data subject; and where consent cannot be practicably given, the transfer is nevertheless in the best interest of the data subject and the data subject would not have objected to it had he been asked.<a href="#_ftn7" name="_ftnref7">[7]</a> These exceptions are broad enough to ensure the pace of international transactions is not unnecessarily hindered.</p>
<p><strong>Data Protection by Design and Default</strong></p>
<p>The DPB is also very progressive in that it accords the Authority with the power to publish directions on good practices and codes of conduct in data protection including the application of data protection principles by design and default in the processing of personal data.<a href="#_ftn8" name="_ftnref8">[8]</a> Data protection by design is a concept that dictates that in light of progressive data protection regimes, companies must ensure that in their activities they incorporate data protection. Essentially since the companies must comply with data protection they must not wait for breaches before they address data protection but rather from the commencement of any action or process data protection must be incorporate and addressed.</p>
<p>On the other hand, data protection by default entails that for those computer products already released, there must be adherence to the highest standard of privacy to ensure data is kept safe and secure. Further, any data necessary for the operation of the product should only be kept for the minimum possible amount of time. The incorporation of these concepts in the DPB is a remarkable step in ensuring that privacy will be respected as technology gets more sophisticated.</p>
<p>The DPB clearly updates the data protection landscape in Malawi to comparable international standards.  This is indeed a shift in the right direction and will ensure that Malawi takes part in the information age. In my next article I shall explore some of the weaknesses in the DPB that may yet be improved to ensure comprehensive legislation is enacted.</p>
<p><strong>Author: Gonjetso Dikiya LLB(Hons) University of Malawi; LLM candidate in Information and Communications Law, University of the Witwatersrand.</strong></p>
<p><strong>Head of Legal Services- Dispute Settlement Services</strong></p>
<p><em>This content appears as a courtesy of <span dir="ltr"><a href="https://ritzattorneys.com/">Ritz Attorneys at Law</a></span></em><em>, a proud member of the</em><a href="https://theccgway.com/"> <strong><em>China Collaborative Group (CCG Association)</em></strong></a><em>. It is informational in nature and does not constitute legal advice or establish an attorney-client relationship between you and its author, publisher or any member of CCG. For more information, please visit </em><strong><a href="https://ritzattorneys.com/"><em>https://ritzattorneys.com/</em></a><em>.</em></strong></p>
<p><strong> </strong></p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> Roos Anneliese ‘Core Principles of Data Protection’ 2006 <em>CILSA</em> 102-130.</p>
<p><a href="#_ftnref2" name="_ftn2">[2]</a> S. 18 of the DPB</p>
<p><a href="#_ftnref3" name="_ftn3">[3]</a> S. 23 of the DPB.</p>
<p><a href="#_ftnref4" name="_ftn4">[4]</a> Part VI of the DPB.</p>
<p><a href="#_ftnref5" name="_ftn5">[5]</a> S. 34(1)(a) of the DPB.</p>
<p><a href="#_ftnref6" name="_ftn6">[6]</a> S. 34(1)(a) of the DPB.</p>
<p><a href="#_ftnref7" name="_ftn7">[7]</a> S 36 of the DPB.</p>
<p><a href="#_ftnref8" name="_ftn8">[8]</a> S. 13 of the DPB</p>
<p>The post <a rel="nofollow" href="https://www.theccgway.com/2021/12/20/insights-into-personal-data-protection-bill/">Insights into Personal Data Protection Bill</a> appeared first on <a rel="nofollow" href="https://www.theccgway.com">China Collaborative Group</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>China&#8217;s assertive stance and the impacts for your company</title>
		<link>https://www.theccgway.com/2021/09/23/chinas-assertive-stance-and-the-impacts-for-your-company/</link>
		
		<dc:creator><![CDATA[CCG]]></dc:creator>
		<pubDate>Thu, 23 Sep 2021 02:33:34 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[foreign investment]]></category>
		<category><![CDATA[Horizons Corporate Advisory]]></category>
		<guid isPermaLink="false">https://www.theccgway.com/?p=4368</guid>

					<description><![CDATA[<p>Deng Xiaoping initiated the Reform and Opening Up policy and opened the door to the world in 1978. As a result, China’s GDP rose from 367.9 billion yuan in 1978...</p>
<p>The post <a rel="nofollow" href="https://www.theccgway.com/2021/09/23/chinas-assertive-stance-and-the-impacts-for-your-company/">China&#8217;s assertive stance and the impacts for your company</a> appeared first on <a rel="nofollow" href="https://www.theccgway.com">China Collaborative Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="entry-content clearfix">
<p>Deng Xiaoping initiated the Reform and Opening Up policy and opened the door to the world in 1978. As a result, China’s GDP rose from 367.9 billion yuan in 1978 to 15.45 trillion yuan in 2020 and lifted China from a third-world country to becoming a global economic superpower.</p>
<p>In the last 40 years, China’s significant economic growth has increased its role in the world both as a trade and investment partner and as an international Institution member in the United Nations (1945), World Trade Organisation (2001), and World Bank (1980). As a result, China holds a more influential and significant role in the world today than 40 years ago and more recently demonstrating a more mature and assertive stance.</p>
<p>Internationally, China has increased activism and assertiveness within international institutions (“Institutions”) in recent years. Specifically, China increased engagement in formulating policies and positions within the Institutions and increasingly utilised such Institutions as platforms to articulate its’ position. Equally, today’s institutions represent a broader range of countries with different priorities, needs, and interests than the founding members. Therefore, Institutions are increasingly evolving from the post-second world war era, in which the USA played a primary role in the founding principles of the Institutions.</p>
<p>Domestically, China has adopted a collection of legislation to strengthen the national sovereignty and interests, including:</p>
<ul>
<li>The Cyber Security Law of the People’s Republic of China effective from 1 June 2017</li>
<li>The Export Control Law of the People’s Republic of China effective from 1 December 2020</li>
<li>Rules on Counteracting Unjustified Extra-Territorial Application of Foreign Legislation and other Measures, effective from 9 January 2021</li>
<li>The Anti-Foreign Sanctions Law of the People’s Republic of China effective from 10 June 2021</li>
<li>Data Security Law of the People’s Republic of China effective from 1 September 2021</li>
</ul>
<p>For companies and individuals doing business in or with China, such legislation defines business operations – especially cross-border activities in several areas.</p>
<p>With a rapidly growing middle-class in China, the Chinese market for many companies is an increasingly important and growing market segment. Therefore, companies either invested or planning to invest in the Chinese market cannot disregard national sovereignty and interests’ compliance within their business operations. Below, we highlight the three key areas of national sovereignty and interests’ compliance applicable to companies doing business in or with China.</p>
<h3><strong>Cyber and data security</strong></h3>
<p>Cybersecurity for many countries is a top national priority to maintain secure networks and protect data from cyber-attacks.</p>
<p>In China, cyber security is centred on the security of the collected data, and companies are obliged to ensure networks collecting and processing the data are secure, monitored and shall not endanger national security or sovereignty.</p>
<p>The Cyber Security Law of the People’s Republic of China (“CSL”) and Data Security Law of the People’s Republic of China (“DSL”) are two primary legislation governing cyberspace and affect all companies working with data collection, processing, and management in China.</p>
<h4><em>Cyber Security Law</em></h4>
<p>The CSL establishes the compliance framework for network operators and is the overarching law for cybersecurity.</p>
<p>Under CSL, the network operator is defined as owners and administrators of the network and network service providers and obliged to ensure servers and data stored, transmitted, or created on such servers are secure and protected from cyber-attacks. Furthermore, the CSL outlines a Critical Information Infrastructure (“CII”), which subjects information crucial to national security and economy to store the collected and produced personal information and important data within the territory of mainland China. Any data required to be transmitted aboard shall be conducted under measures of the Cyberspace Administration of China.</p>
<h4><em>Data Security Law</em></h4>
<p>DSL sets forth an overarching framework to regulate data handling and management accordingly with national sovereignty, security, and development interests.</p>
<p>Under the DSL, the scope and definition of data include any record of information in electronic or other forms and imposes an extraterritorial application to China-related data handling and management.</p>
<p>Organisations and individuals are obliged to ensure and formulate data management policies, cooperate with public security and national security organs that require their data for national security or criminal investigation. Mismanagement of data, specifically those handling important data could face significant liabilities for both the company and individual.</p>
<h3><strong><em>Export Controls</em></strong></h3>
<p>Prior to the adoption of the Export Control Law of the People’s Republic of China (“ECL”), export controls were scattered across several laws. The ECL is the first comprehensive framework establishing export controls, a list of controlled items, and provisioning extra-territorial application to individuals and organisations outside of China who endanger national security and interests.</p>
<p>Under the ECL any export of the controlled items from an individual or organisation within the territory of mainland China to an overseas individual or organisation is subject to certain obligations including obtaining the relevant license from the State Export Control Authorities. Controlled items are defined under the ECL as the following:</p>
<ul>
<li>Dual-use items which can be for civil and military purposes or helping to improve military potentials, especially goods, technologies, and services in design, development, production, or application utilised for weapons of mass destruction;</li>
<li>Military products comprising of equipment, special production facilities, and other related goods, technologies, and services utilised for military purposes;</li>
<li>Nuclear materials, including nuclear equipment, non-nuclear materials used for nuclear reactors, and related technologies and services;</li>
<li>Technical materials and data related to the items listed above.</li>
</ul>
<p>For companies with an international supply chain or engaged in cross-border research and development, the ESL has a significant impact on exporting operations. For example, foreign items containing components assembled or manufactured in China could be deemed as controlled items or cross-border research or technology transfer, activities such as research, inter-company research (where the research and development centre are in China), or technology sales to foreign enterprises could be classified as related technical material and data – thus subject to export control.</p>
<h3><strong><em>Addressing sanctions</em></strong></h3>
<p>In 2021, China addressed the application of foreign legislation and sanctions to Chinese individuals and legal entities both within and outside of the territory of China. Two main legislation were enacted and established a stricter stance against foreign economic sanctions against Chinese organisations and individuals.</p>
<h4><em>Rules on Counteracting Unjustified Extra-Territorial Application of Foreign Legislation and other Measures</em></h4>
<p>Early this year, the Rules on Counteracting Unjustified Extra-Territorial Application of Foreign Legislation and other Measures (“Rules”) were promogulated by the Ministry of Commerce. The Rules provision a working mechanism for Chinese companies and individuals affected by extraterritorial foreign legislation that prohibit or restrict engagement in normal economic, trade, and related activities with a third State (or region) or its citizens, legal person, or other organisations. Affected individuals or entities are required to such matters to the State Council within 30 days. The State Council shall issue a prohibition order to oppose an unjustified extra-territorial application of foreign legislation and other measures.</p>
<p>Foreign companies in China especially multinationals should note the Rules stipulate any Chinese entities who comply with the unjustified extra-territorial application of foreign legislation subject to a prohibition order can be pursued in court.</p>
<h4><em>The Anti-Foreign Sanctions Law of the People’s Republic of China</em></h4>
<p>The Anti-Foreign Sanctions Law of the People’s Republic of China (“AFSL”) establishes the regulatory framework for foreign persons, both legal entities and individuals, acting against China’s national interests. Under the AFSL, organisations, individuals, and affiliated individuals who directly or indirectly participate in formulating, deciding, and implementing discriminatory restrictive measures against China shall be included in a Sanctions List (“List”). Those included in the List shall be subject to penalties including visa restrictions, prohibitions, or restricted conduct in transactions, cooperation, or other activities with Chinese organisations or individuals. Therefore, for foreign companies and individuals doing business in or with China, AFSL significantly impacts external conduct and communications, and public relations.</p>
<p>Whilst some may view a more assertive China negatively, China’s international significance and role cannot be disregarded. Specifically, in the business world, companies involved in the Chinese market should evaluate their full operations and third parties’ relations and update relevant policies or establish China-specific policies, otherwise risk legal penalties and economic losses. Unless companies forgo the China market completely, the recent legislative movements in strengthening national sovereignty and interests should be reflected in company operations and policies. Companies generating business from China cannot disregard China’s principles around national sovereignty and interests.</p>
<p><em>This content appears as a courtesy of </em><a href="http://horizons-advisory.com/"><strong><em>Horizons Corporate Advisory</em></strong></a><em>, a proud member of the</em><a href="https://theccgway.com/"> <strong><em>China Collaborative Group (CCG Association)</em></strong></a><em>. It is informational in nature and does not constitute legal advice or establish an attorney-client relationship between you and its author, publisher or any member of CCG. For more information, please visit </em><a href="http://www.horizons-advisory.com"><strong><em>www.horizons-advisory.com</em></strong></a><em>. </em></p>
</div>
<p>The post <a rel="nofollow" href="https://www.theccgway.com/2021/09/23/chinas-assertive-stance-and-the-impacts-for-your-company/">China&#8217;s assertive stance and the impacts for your company</a> appeared first on <a rel="nofollow" href="https://www.theccgway.com">China Collaborative Group</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Are you prepared for the Data Security Law effective from 1 September 2021?</title>
		<link>https://www.theccgway.com/2021/09/09/are-you-prepared-for-the-data-security-law-effective-from-1-september-2021/</link>
		
		<dc:creator><![CDATA[CCG]]></dc:creator>
		<pubDate>Thu, 09 Sep 2021 06:31:21 +0000</pubDate>
				<category><![CDATA[China]]></category>
		<category><![CDATA[Law]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Horizons Corporate Advisory]]></category>
		<guid isPermaLink="false">https://www.theccgway.com/?p=4353</guid>

					<description><![CDATA[<p>On 10 June 2021, the Standing Committee of the 13th National People’s Congress adopted the Data Security Law of the People’s Republic of China (“Data Security Law”) effective from 1...</p>
<p>The post <a rel="nofollow" href="https://www.theccgway.com/2021/09/09/are-you-prepared-for-the-data-security-law-effective-from-1-september-2021/">Are you prepared for the Data Security Law effective from 1 September 2021?</a> appeared first on <a rel="nofollow" href="https://www.theccgway.com">China Collaborative Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>On 10 June 2021, the Standing Committee of the 13<sup>th</sup> National People’s Congress adopted the Data Security Law of the People’s Republic of China (“Data Security Law”) effective from 1 September 2021.</p>
<p>The Law establishes an overarching framework to regulate data handling and management accordingly with national sovereignty, security, and development interests. Under the Data Security Law, the scope and definition of data include any record of information in electronic or other forms and an extraterritorial application to China-related data handling and management. As a result, companies should be implementing changes for the forthcoming September effective date.</p>
<p>At Horizons, we have been advising clients with China commercial interests to evaluate data handling and management in preparation for the Data Security Law. Specifically, we recommend appointing a specific China data management officer who develops compliance policies and correct implementation to safeguard the company. We highlight below the main takeaways and the practical implications for companies doing business in or with China.</p>
<p><strong>Scope of Data</strong></p>
<p>The Data Security Law defines the scope of data and handling as the following in Article 3:</p>
<ul>
<li>Data shall refer to any record of information in electronic or other forms.</li>
<li>Data handling shall refer to the collection, storage, use, processing, transmission, provision, and disclosure of data.</li>
<li>Data security shall refer to the ability to ensure data is effectively protected, lawfully used, and kept in a secure state by adopting necessary measures.</li>
</ul>
<p>In practice, the Data Security Law focuses on data security, electronic and non-electronic forms, and data handling activities. The Cyber Security Law adopted on 1 June 2017 focuses on the supervision and management of information and network systems. Therefore, the scope of Data Security Law is broader and affects all companies handling online and offline data.</p>
<p><strong>Data Classification</strong></p>
<p>The Law designates the State to establish a data classification and grading mechanism based on two aspects:</p>
<ul>
<li>degree of importance to economic and social development.</li>
<li>the level of damage to national security, public interests, organisations where the data is tampered with, destroyed, leaked, or illegally obtained or used.</li>
</ul>
<p>For data identified as important data, a specific catalogue shall be formulated by each region and department. Regional and department shall determine and grade important data accordingly to the relevant industry and areas and establish stricter data protection obligations. Equally, national security data, the lifelines of the national economy, people’s key livelihood, and major public interests shall be classified as core data and subject to a stricter management system.</p>
<p>Therefore, companies should anticipate stricter data management obligations. Specifically for multinationals involved in cross-border data transfer, important or national data could be defined as controlled categories and subject to export controls.</p>
<p><strong>Data Security Protection Obligations</strong></p>
<p>Although obligations are dependent on the type of data handled, we recommend companies appoint specific personnel or management to supervise the data management and ensure policies are correctly implemented. Moreover,</p>
<p>For all companies conducting data handling activities, the Data Security Law stipulates the following obligations:</p>
<ul>
<li>establish and perfect a data security management system across the entire workflow;</li>
<li>adopt lawful and proper methods in collecting data and obtaining data by illegal means is forbidden;</li>
<li>organise and conduct data security education and training;</li>
<li>adopt the corresponding technical measures and other necessary measures to ensure data security; and</li>
<li>take immediate disposal measures, notify users as required and report the matter to the relevant competent department.</li>
</ul>
<p>For companies handling data classified as important data, the following obligations are provisioned</p>
<ul>
<li>specify responsible personnel and management bodies for data security;</li>
<li>fully implement data security protection responsibilities;</li>
<li>periodically conduct risk assessments for their data handling activities;</li>
<li>periodically submit a risk assessment report to the competent department</li>
<li>the risk assessment shall include the categories and quantities of the important data handled by the organisation, how data is handled, any occurred data security risks, and countermeasures</li>
</ul>
<p>Moreover, organisations and individuals are obligated to cooperate with public security and national security organs that require their data for national security or criminal investigation. In practice, data privacy policies should be revised accordingly. Where data laws of other jurisdictions may cross over, such as the General Data Protection Regulation, the application of the two could be challenging and specialised advice should be sought.</p>
<p><strong>Extraterritorial Application</strong></p>
<p>Whilst the Data Security Law applies to the data handling activities within the People’s Republic of China (“PRC”), related data handling outside of PRC could be subject to investigation. Specifically, in Article 2, where data handling outside of PRC harms the national security, public interests, or legitimate rights and interests of citizens or organisations of the PC, legal liability shall be investigated. Although specific liabilities are not mentioned, violations of the Data Security Law are subject to civil, public security administration, and criminal penalties. Therefore, companies outside of China handling related China data should still implement China-specific data compliance policies to migrate unintentional violations and risk future liabilities.</p>
<p>Violations of the Data Security Law are subject to fines between 50,000 RMB and 2 million RMB, and companies may concurrently be ordered to suspend relevant business or revocation of business licenses. Consequently, data security protection is significant and shall not be taken lightly.</p>
<p>The Data Security Law paves the significant role of the State in data development and protection, as China advances the digital economy. Mismanagement of data, specifically those handling important data could face significant liabilities for both the company and individual.</p>
<p><em>If you have questions or would like to know more about the corporate services available to you from Horizons, please contact us at +86 21 5356 3400 or email <a href="mailto:crisis.services@horizons-advisory.com">talktous@horizons-advisory.com</a></em>.</p>
<p><em>This content appears as a courtesy of </em><a href="http://horizons-advisory.com/"><strong><em>Horizons Corporate Advisory</em></strong></a><em>, a proud member of the</em><a href="https://theccgway.com/"> <strong><em>China Collaborative Group (CCG Association)</em></strong></a><em>. It is informational in nature and does not constitute legal advice or establish an attorney-client relationship between you and its author, publisher or any member of CCG. For more information, please visit </em><a href="http://www.horizons-advisory.com"><strong><em>www.horizons-advisory.com</em></strong></a><em>. </em></p>
<p>The post <a rel="nofollow" href="https://www.theccgway.com/2021/09/09/are-you-prepared-for-the-data-security-law-effective-from-1-september-2021/">Are you prepared for the Data Security Law effective from 1 September 2021?</a> appeared first on <a rel="nofollow" href="https://www.theccgway.com">China Collaborative Group</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
